An Approach for Security Patterns Application in Component Based Models

被引:0
|
作者
Bouaziz, Rahma [1 ,2 ]
Kallel, Slim [2 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
[2] Univ Sfax, ReDCAD, Sfax, Tunisia
关键词
component based approach; Security pattern; RBAC; UML profile; Model Driven Development; DESIGN; INTEGRATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since applications have become increasingly complex and because the design of secure systems necessitates security expertise, security patterns are now widely used as guidelines proposed by security experts in order to solve a recurring security problem. In order to encourage application designers to take advantage from security solutions proposed by security patterns, we think that it is necessary to provide an appropriate mechanism to implement those patterns. We propose a full security pattern integration methodology from the earliest phases of software development until the generation of the application code. The proposed solution uses the UML component model as an application domain of security patterns and bases on the use of UML profiles and model transformations with the ATL language. For the generation of code and for keeping the separation between the functional code of the component based application and security solution, we use the aspect paradigm. An illustration of the proposed approach is provided using the Role Based Access Control (RBAC) pattern. A case study of GPS system is also provided to demonstrate the application of the proposed approach.
引用
收藏
页码:283 / +
页数:4
相关论文
共 50 条
  • [41] Models for Measuring Access Security of Web Application
    Thienne Colombo, Regina Maria
    Guerra, Ana Cervigni
    de Paula Pessoa, Marcelo Schneck
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 1030 - 1033
  • [42] Application Security Models for Mobile Agent Systems
    McDonald, J. Todd
    Yasinsac, Alec
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (03) : 43 - 59
  • [43] A security mechanism for component-based systems
    Grechanik, M
    Perry, DE
    Batory, D
    FIFTH INTERNATIONAL CONFERENCE ON COMMERCIAL-OFF-THE-SHELF (COTS) - BASED SOFTWARE SYSTEM, PROCEEDINGS, 2006, : 53 - +
  • [44] A framework for security assurance in component based development
    Jeong, GB
    Kim, GB
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 42 - 51
  • [45] Security Testing Based on Attack Patterns
    Bozic, Josip
    Wotawa, Franz
    2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 4 - 11
  • [46] Development of Applications Based on Security Patterns
    Serrano, Daniel
    Ruiz, Jose F.
    Munoz, Antonio
    Mana, Antonio
    Armenteros, Alvaro
    Crespo, Beatriz Gallego-Nicaso
    DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, : 111 - +
  • [47] Component based security control for information network
    Wang, Yu
    Lu, Jun
    Wu, Zhongwang
    Lu, Yu
    2006 IMACS: MULTICONFERENCE ON COMPUTATIONAL ENGINEERING IN SYSTEMS APPLICATIONS, VOLS 1 AND 2, 2006, : 1357 - +
  • [48] Component Based Information Network for Computer Security
    Ortiz, Joel
    Tomelden, Johnly
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 467 - 469
  • [49] A framework for security assurance in component based development
    Kim, H
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 587 - 596
  • [50] A security engineering process based on patterns
    Hatebur, Denis
    Heisel, Maritta
    Schmidt, Holger
    DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 734 - +